Android Mobile Devices Context Based Access Control Systems
DOI:
https://doi.org/10.55524/ijirem.2023.10.2.25Keywords:
Android Mobile, Smart Phone, Security And Privacy, Context Based Access ControlAbstract
The Mobile applications designed for An droid frequently have access to private information and re sources stored on the user's device. The improper use of this data by malicious programs has the potential to result in breaches of privacy as well as the disclosure of sensitive data. An example of this would be a malicious application capturing a confidential business chat in the background without the user's knowledge. The issue is caused by the fact that Android users do not have control over the capabilities of programs once those applications have been granted the desired access during installation. This is what causes the problem. It is necessary for us to have a context-based ac cess control mechanism so that privileges can be dynamical ly provided or revoked to applications based on the specific context of the user. This is because there are numerous situa tions in which the possibility that an application will be al lowed a privilege is contingent on the specific context of the user. In this article, we suggest an access control system along these lines. Our implementation of context distin guishes between subareas that are geographically adjacent to one another within the same location. We have made certain changes to the Android operating system in order to enable context-based access control limitations, which can then be set and implemented. We have carried out a number of tests in order to evaluate both the efficacy of our access control mechanism and the precision of context recognition.
Downloads
References
Ali-Gombe, Aisha, et al. "AspectDroid: Android app analysis system." Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy. 2016.
Shrivastava, Gulshan, et al. "Privacy issues of android applica tion permissions: A literature review." Transactions on Emerg ing Telecommunications Technologies 31.12 (2020): e3773.
Cao, Weicheng, et al. "A large scale study of user behavior, expectations and engagement with Android permissions." 30th USENIX Security Symposium (USENIX Security 21). 2021.
Wikipedia, “Samsung galaxy s4 specifications,” http://en.wikipedia.org/wiki/Samsung Galaxy S4, May 2013 [5] Talal, Mohammed, et al. "Comprehensive review and analysis
of anti-malware apps for smartphones." Telecommunication Systems 72 (2019): 285-337.
A. Kushwaha and V. Kushwaha, “Location based services us ing android mobile operating system,” International Journal of Advances in Engineering and Technology, vol. 1, no. 1, pp. 14–20, 2011.
J. Leyden, “Your phone may not be spying on you now – but it soon will be,” http://www.theregister.co.uk/2013/04/24/kaspersky mobile malware infosec/, April 2013.
R. Templeman, Z. Rahman, D. J. Crandall, and A. Kapadia, “Placeraider: Virtual theft in physical spaces with smartphones,” CoRR, vol. abs/1209.5982, 2012.
Wang, Chenwei, et al. "GPS 5.0: an update on the prediction of kinase-specific phosphorylation sites in proteins." Ge nomics, Proteomics & Bioinformatics 18.1 (2020): 72-80.
Demissie, Biniam Fisseha, Mariano Ceccato, and Lwin Khin Shar. "Security analysis of permission re-delegation vulnera bilities in Android apps." Empirical Software Engineering 25 (2020): 5084-5136.